Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=aa5e1fe7d1af9a5e5a118547d4f7947bc05d54d7
commit aa5e1fe7d1af9a5e5a118547d4f7947bc05d54d7 Author: voroskoi <[EMAIL PROTECTED]> Date: Thu Sep 6 11:24:53 2007 +0200 FSA256-tor diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 3c8f571..0cfabe7 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>256</id> + <date>2007-09-06</date> + <author>voroskoi</author> + <package>tor</package> + <vulnerable>0.1.2.14-1terminus1</vulnerable> + <unaffected>0.1.2.16-1terminus1</unaffected> + <bts>http://bugs.frugalware.org/task/2365</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4174</cve> + <desc>A vulnerability has been reported in Tor, which can be exploited by malicious people to bypass certain security restrictions. + The vulnerability is caused due to the ControlPort (localhost:9051) handling commands without authentication when the first command was not a successful "authenticate" command. This can be exploited to e.g. modify the "torrc" file, when a user views a malicious web page containing a specially crafted POST request or via a malicious tor exit node. + Successful exploitation may compromise a user's anonymity, but requires that the ControlPort is enabled.</desc> + </fsa> + <fsa> <id>255</id> <date>2007-09-06</date> <author>voroskoi</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
